How to Remove Jett Ransomware [.jett Files Virus]?
Research on Jett Ransomware [.jett Files Virus]
Jett Ransomware, identified by its signature .jett
file extension, is a hybrid-cryptography malware targeting Windows systems. Unlike traditional ransomware, Jett employs a dual AES-256 and RSA-4096 encryption algorithm, making decryption without the attacker’s private key nearly impossible. Initial infection vectors include phishing emails disguised as delivery notifications (e.g., “Your Amazon Package is Delayed – Invoice Attached”) and malvertisements on adult websites offering fake “video codec” downloads. Once activated, Jett virus disables Volume Shadow Copies, deletes backup files via vssadmin.exe delete shadows /all /quiet
, and encrypts documents, images, databases, and even cloud-synced folders. Victims report ransom demands ranging from 0.5 to 2.5 BTC (≈$35,000–$110,000 as of March 2025) with a 24 or 48-hour deadline. .
Reports from Jett Virus Victims
“I attempted to install a pirated game, which unfortunately led to a virus infecting my PC. My father even went as far as formatting the computer, but once we turned it back on, we found that many important family files like photos, videos, and GIFs had been encrypted. Now, all these files have a .jett extension, and I can’t seem to fix it. These files are incredibly important to my family, including irreplaceable photos of my late grandmother. Is there any way to recover them? I really need some help with this.. A ransom note said, ‘You have to pay for decryption in Bitcoins!”
— Jojo (March 6, 2025)
“About an hour ago, I downloaded and unzipped a file, then ran it with Microsoft Defender turned off. Shortly after, my laptop started lagging, and I noticed that my wallpaper had changed. Worse yet, most of my files are now encrypted with a .jett extension added to them. What should I do?. the hackers left a ReadMe.txt ransom note asking me to pay Bitcoin.
— Michael T., (March 6, 2025)
Jett’s File Encryption Logic
# Simplified Python-like pseudocode showing encryption flow
import os
from Crypto.Cipher import AES
def encrypt_file(path):
key = os.urandom(32) # AES-256 key
iv = os.urandom(16)
cipher = AES.new(key, AES.MODE_CBC, iv)
with open(path, 'rb') as f:
data = f.read()
encrypted = cipher.encrypt(pad(data))
new_path = path + ".jett"
with open(new_path, 'wb') as f:
f.write(iv + encrypted)
os.remove(path)
*Example simplified for analysis. Actual Jett code uses polymorphic obfuscation.
Threat Testing Logs (Sample)
[2025-03-06 14:22:01] Process injected: svchost.exe (PID 4412) [2025-03-06 14:22:17] Files encrypted: 842/842 (C:\Users\Test\Documents) [2025-03-06 14:23:05] Ransom note created: ReadMe.txt [2025-03-06 14:23:11] C2 communication: POST to 185.163.45[.]22/api/check_payment
Step 1. End malicious process run by Ransomware and related malware.
1. Hit Ctrl + Shift + Esc keys at the same time to open Windows Task Manager:
2. Find malicious process related with ransomware or malware, and then right-click on it and click End Process or End Task.
Step 2. Uninstall malicious programs associated with Jett Ransomware [.jett Files Virus].
Press “Win + R ” keys together to open the Run screen;
Type control panel in the Run window and click OK button;
In Control Panel, click Uninstall a program under Programs;
Look for malicious app related with ransomware; Right-click on the malicious program and click Uninstall.
Many malware may re-install themselves multiple times if you don’t delete thier core files. To get rid of Jett Ransomware [.jett Files Virus] completely, we recommend downloading SpyHunter Aniti-malware to scan entire system and delete all malicious files. Download SpyHunter For Windows (Free Trial) *OFFER – The SpyHunter Trial version includes, for one device, a one-time 7-day Trial period for SpyHunter 5 Pro (Windows) or SpyHunter for Mac. Check Terms & Conditions of SpyHunter Free Trial , EULA and Privacy/Cookie Policy. |
Step 3. Remove malicious files created by Jett Ransomware [.jett Files Virus] or related malware.
1. Hit Windows + R keys at the same time to open Run window and input a regedit and click OK:
2. In the Registry Editor, hit Windows key + F key together to open Find window → Enter virus name → Press Enter key to start search.
3. When the search is completed, right click the folders related with ransomare and click Delete button:
Please Read This Before You Remove Registry Files PLEASE Be Carefully, Do Not Delete Healthy Registry Entries, Or Your Computer May Be Damaged. If you are not able to determine which regsitry files are malicious, we recommend downloading SpyHunter Anti-malware to scan entire system and find out all malicious files. It can avoid mistakes and may reduce the cleanup time from hours to minutes. Download SpyHunter For Windows (Free Trial) *OFFER – The SpyHunter Trial version includes, for one device, a one-time 7-day Trial period for SpyHunter 5 Pro (Windows) or SpyHunter for Mac. Check Terms & Conditions of SpyHunter Free Trial , EULA and Privacy/Cookie Policy. |
Step 4. Use SpyHunter Antimalware to Re-check entire PC and Fix All Security Issues:
Download SpyHunter For Windows (Free Trial)
*OFFER – The SpyHunter Trial version includes, for one device, a one-time 7-day Trial period for SpyHunter 5 Pro (Windows) or SpyHunter for Mac. Check Terms & Conditions of SpyHunter Free Trial , EULA and Privacy/Cookie Policy.
– Double-click SpyHunter-Installer.exe to install it:
– Then run a scan to find out all malicious items and then fix all security problems.
Step 4. Search For Legitimate Files Decryption Tools.
1. Search Decryption Keys on Emsisoft.com, which provide users with Free Ransomware Decryption Tools.
Here is the page you can get decrypotion tools: https://www.emsisoft.com/ransomware-decryption-tools/
2. Search Decryption Keys on The No More Ransom Project.
Here is the link: https://www.nomoreransom.org/en/decryption-tools.html
Key Strategies For Securing Computer from Ransomware
- Regular Software Updates: Keep software and operating systems updated to fix vulnerabilities.
- Use Antivirus Software: Install reputable antivirus to detect and prevent malware.
- Backup Data Regularly: Maintain backups in offsite locations or cloud storage.
- Educate Yourself and Others: Recognize phishing emails and suspicious links.
- Enable Firewall: Block malicious traffic with a firewall.
- Use Strong, Unique Passwords: Implement strong passwords, consider a password manager.
- Be Cautious with Email Attachments and Links: Avoid unknown email attachments and links.
- Limit User Privileges: Use the least privilege necessary for tasks.
- Use Content Scanning and Filtering: Scan and filter emails to detect threats early.
- Stay Informed: Keep up with latest malware trends and security recommendations.